Tag Archives: Term 1

CYBER.ORG: CYBER LAW CASE STUDY AND QUIZ

Objective: Students will begin preparing for proficiency in cyber security with an overview of relevant domestic and international laws so they can conduct cybersecurity operations within the boundaries of domestic and international law.

Resources:

  • Read the PowerPoint presentation: Appendix C – Federal Laws.pptx
  • Cyber Law Quiz

Assignment:

  1. Visit the Google Classroom page to download and read the Cyber Laws.pptx presentation to learn about the domestic and international laws related to cybersecurity that we will discuss in class today.
  2. Download and read the Case Study – Cyber Law.pdf document. We will be completing a Case Study activity to collect our thoughts on the issues raised by the incident discussed in the article.
  3. The class will conclude with a brief Check for Understanding quiz to confirm your understanding of the laws and regulations that pertain to the cyber security profession.

Assigned: August 31st, 2021
Teacher Pacing Due Date: September 2nd, 2021

CYBER Security BOOT CAMP – WEEK 3: WEBMINAL AND VIM TUTOR

Objective: 

Students will continue preparing for proficiency in cyber security by completing a tutorial on the VIM Text Editor application within the Linux Command Line Interface.

Links:

Topics Discussed:

  • Linux
  • GUI
  • CLI
  • Shell
  • bash
  • Prompt
  • Input/Output
  • VIM text editor

Assignment:

  1. Visit Webminal.org, and log in using the account that you created last week.
  2. By now you should have completed lessons 1 through 5, and should have a basic understanding of how to navigate, create and manipulate files and directories, and manipulate system processes within the Linux CLI.
  3. This week, we are going to further investigate the manipulation of text files within the Linux CLI by using the first of two very popular text editors built into Linux: VIM
  4. Log into Webminal.org and type “vimtutor” at the command prompt.
  5. Complete the VIM Tutorial. There are seven lessons in the tutorial, and upon completion, you should have a basic understanding of how to create, edit and save files, as well as get additional help in VIM.
  6. You should be able to complete the seven lessons by the end of this week. Pace yourself accordingly.
  7. To demonstrate final completion of the seven lessons: show me your completed “~/.vimrc” configuration file (and/or upload a copy to the related Google Classroom assignment post).

Assigned: August 23rd, 2021
Teacher Pacing Due Date: August 26th, 2021

CYBER SECURITY BOOT CAMP – WEBMINAL

Objective: 

Students will begin preparing for proficiency in cyber security and information security techniques, technologies and methodologies.

Links:

Topics Discussed:

  • Linux
  • GUI
  • CLI
  • Shell
  • bash
  • Prompt
  • Input/Output

Assignment:

  1. Visit Webminal.org, and create an account using your haydenmagnet.org email address.
  2. Continue exploring the Linux command line, using the command descriptions and tutorials available on the Webminal site.

Assigned: August 16th, 2021
Teacher Pacing Due Date: August 17th, 2021

CYBER SECURITY BOOT CAMP – DAY 1: BEGINNING THE LINUX JOURNEY – SPRING 2021

Objective: 

Students will begin preparing for proficiency in cyber security and information security techniques, technologies and methodologies by learning the basics of the Linux operating system.

Links:

Topics Discussed:

  • Curriculum Overview
  • Cyber Security
  • Linux
  • Linux History
  • GNU
  • GPL
  • Linux Distributions
  • Linux Kernel
  • Package Management
  • Rolling Release
  • Branches
  • Advantages/Disadvantages of Linux

Assignment:

  1. The first step on our journey to Cybersecurity proficiency is to gain proficiency in the Linux operating system. A large portion of the systems that run the Internet run on a variant of Linux, and therefore learning how to effectively use the Linux command line will be a necessary step towards gaining this proficiency.
  2. We will begin by visiting the Linux Journey website, and we will walk through the online instruction modules together, learning about the history of Linux, and working our way through a few of the various distributions of Linux, noting the unique features of each and exploring the advantages and disadvantages presented by each flavor of Linux.
  3. Tomorrow, we will begin working with the Command Line Interface in Linux, and investigate a few important commands.

Assigned: August 12th, 2021
Teacher Pacing Due Date: August 13th, 2021

HAYDENMAGNET.ORG ACCOUNTS AND GOOGLE CLASSROOM 2021

Objective:

  • Successfully log into your Haydenmagnet.org Google Account.
  • Create a Google Doc.
  • Connect to the Google Classroom for your class period.
  • Turn in your Google Doc using Google Classroom.

Student-Friendly Objective:

  • I can log into my Haydenmagnet.org Google Account with the login information provided to me and turn in an assignment using Google Classroom, so that I can successfully hand in assignments throughout the school year.

Links:
Google Apps for Carl Hayden: https://www.haydenmagnet.org

Topics Discussed:

  • Haydenmagnet.org
  • Google Drive
  • Google Classroom

Assignment:

  • Open a Chrome browser and visit the Google website.
  • Click the blue Sign In button in the upper right corner.
  • Sign in with the Haydenmagnet.org account provided to you in your Computer Fundamentals or Computer Science class. If you do not remember your username or password from this account, or if you never took Computer Fundamentals or Computer Science, please see Mister Marmolejo to get your account information.
  • Once you are logged in, click on the “waffle” icon in the upper right corner and choose “Drive” from the list of Google Apps to access Google Drive. Here you will have access to the most useful Google Apps: Document, Presentation, Spreadsheet, Form and Drawing.
  • Click on the blue New button on the left hand side, and create a new Google Doc.
  • In this document, write a couple of sentences to tell me about the most interesting thing you’ve learned during our past two weeks together. It can be anything you learned in this class: something about the room, about the class itself, about me or another member of the class, etc.
  • When you are finished, click the words “Untitled Document” in the upper left corner, and give this document a proper name.
  • Open a new Window or Tab in Safari and navigate to https://classroom.google.com.
  • You should be able to join the Classroom using the code provided in class. If you did not receive the code, please see Mr. Marmolejo.
  • Look over the introduction post and the current assignment. This is where you will turn in the Google Doc you just created.
  • Attach the Google Doc to today’s assignment and submit it using Google Classroom by tomorrow.
  • If you have any questions, my email address is mi.marmolejo@haydenmagnet.org.

Assigned: August 10th, 2021
Teacher Pacing Due Date: August 12th, 2021

ACCOUNT SETUP 2021-22

Objectives:

  • Create and test student login accounts.

Objective:

  • I can successfully log on to the lab workstations.

Links:

Lab Use Policy Presentation

Topics Discussed:

  • Proper use of school and network resources
  • Software Copying
  • Copyright
  • Software Privacy and Vandalism
  • Care of Equipment
  • Food and Drink Policy
  • Internet Usage Guidelines
  • Consequences of Policy Violation

Assignment:

  1. Today I’ll walk you through the process of logging in to the computer for the first time.
  2. Don’t forget your Plans for Success are due today! Make sure you get those turned in to me before you leave class.
  3. Tomorrow, we’ll begin our introduction to the Macintosh operating system, so make sure you give me your Plan for Success and get logged in today so you’re ready for this week’s lessons.

Posted: August 9th, 2021

INTRO TO NETOP – CLASS POLICIES AND PROCEDURES 2021-22

Objective:

  • I can agree to abide by the class policies by reviewing the established policies and procedures to help ensure the classroom is a safe and fun place for everyone.

Links:

None.

Topics Discussed:

  • Classroom policies and procedures

Assignment:

  1. Welcome back! Today we’re going to go over the class rules, or as I like to call them, the policies and procedures.
  2. Society’s based on policies and procedures. Without ’em, we’re no better than poo-flinging monkeys in the jungle. Humans agree to abide by laws so we can all get along and get things accomplished with a minimum of screaming, head-bashing and poo-flinging.
  3. The policies and procedures are pretty straightforward, and they’re all posted in the front of the room where you can see them at all times. They’re all really based on one simple thing: respect.
    1. I’m going to show you respect at all times in the classroom, and all I ask is that you return the favor.
    2. I also ask that you treat everyone else with respect, so that they can do the same for you.
    3. The chairs have wheels for a reason: if you need to scoot over to collaborate with a partner, that’s great. Don’t use them to scoot all over the room, and don’t get up and wander aimlessly. Move with purpose.
    4. Have respect for other people who are trying to get work done, and don’t bother them. Don’t steal anybody’s work (or stuff, for that matter).
    5. Treat my stuff and the school’s stuff with respect, so that it can stay in good shape for you and for everyone else. Let me know right away if anything is marked, damaged or missing so I can address it immediately.
    6. We’re going to have a lot of opportunities to critique the work of others in this class. Keep it respectful, positive and constructive, please. Don’t feel bad if someone else critiques your work, it’s only going to help you improve and get stronger.
    7. I’ve got a lot of cool stuff to teach you in this class. Please don’t make it any harder for me than it already is by disrupting my class, or making it harder for the people around you to pay attention.
    8. I promise not to come to your room and mess it up; can you do me the same courtesy? I’d appreciate it.
    9. Don’t leave the room without my permission. I need to know where you are at all times. If you need to leave the room, please sign out on the digital sign-out sheet provided.
    10. Read your Student Handbook! We all (you and me both) are required to abide by its policies, so it’s important to know exactly what those policies are so you don’t violate them unintentionally (Or intentionally!).
  4. Do any of the class policies seem strange? Like something you shouldn’t have to be asked not to do? Guess what: the reason that policy’s in place is because some knucklehead decided to be a creep and had to be asked to stop. Please: Don’t be that guy.
  5. If you can agree to abide by these policies and procedures, then we can all get along. If there’s anything you feel like you can’t agree to here, let me know and we can talk it over.

Posted: August 3rd, 2021

Section 3.2 – Interfacing with Databases – TestOut

Objective: 

This section introduces you to database access methods, big data, and careers in working with databases. After finishing this section, you should be able to:

  • Explain what SQL is and interpret a basic SQL query.
  • Compare and contrast different methods of accessing data from a database.
  • Define the term Big Data and describe its related challenges and opportunities.
  • Describe various careers in working with databases
  • Use Microsoft Access to perform basic queries on a database.

Links:

Key Terms:

  • Data Definition Language (DDL) Database commands that change the structure, or schema, of the database.
  • Data Manipulation Language (DML) Database commands that modify the records within the database and not the schema itself.
  • Direct Access A method of accessing a database directly using the database management system itself.
  • Query Builder A method of accessing a database using a graphical user interface that allows users to select what actions they want to perform on a database.
  • User Interface Access A method of accessing a database using forms that allow users to interact with the database.
  • Programmatic Access A method of accessing a database using custom computer programs.
  • Data Extraction The process of gathering and organizing big data.
  • Data Mining A broad and open-ended analysis of extracted big data.
  • Big Data Analytics The process of asking specific questions to help interpret big data.
  • NoSQL Nonrelational databases that arise from big data.
  • Database Administrator A person who is responsible for designing, maintaining, backing up, and securing an organization’s databases.
  • Database Developer A person who designs and implements databases, usually by writing SQL code and conducting performance tests to ensure database optimization.
  • Data Analyst A person who specializes in gathering and analyzing data to inform business decisions.
  • Data Scientist A person who focuses on data analysis, especially as it relates to data mining and big data analytics. These positions require even more advanced programming and analytical skills.

Topics Discussed:

  • How can you access and analyze data that’s stored in a relational database?
  • What kinds of questions can be answered by analyzing Big Data?
  • What career opportunities are available in working with databases?

Assignment:

  1. Access the TestOut Courseware through the provided link.
  2. Study Section 3.2: Interfacing with Databases, and achieve a score of 80% or higher on the 10 question Exam to complete the Section.

Assigned: December 9th, 2019
Teacher Pacing Due Date: December 10th, 2019

Section 1.7 – Application Software – TestOut

Objective: 

This section introduces you to various categories of application software and gives you practice managing Windows applications. After finishing this section, you should be able to:

  • Identify application software that increases personal productivity.
  • Identify application software that facilitates collaboration.
  • Identify some common business application software.
  • Run Windows applications.
  • Pin applications to the Start Menu and the taskbar.
  • Unpin applications from the Start Menu and the taskbar.
  • Create application shortcuts on the Windows desktop.
  • Open and print a document from Microsoft Word.
  • Describe Windows printing features.
  • Connect to a shared printer.
  • Configure the default printer.
  • Share a local printer with other users.

Links:

Key Terms:

  • Productivity Software Software that is used to perform common tasks in a business or home office such as word processing, spreadsheets, presentations, web browsing, and visual diagramming.
  • Collaboration Software Software that facilitates the sharing, processing, and management of files, documents and other data between members of a team. This software includes message boards, screen sharing, conferencing software, email, calendaring, instant messaging, text messaging, and online workspace and document sharing.
  • Business Software Software designed for advanced or specialized business functions such as database management, project management, customer relationship management, accounting, desktop publishing, graphic design, and computer aided design.
  • Netiquette The rules of etiquette that should be observed while using computer networks, such as the Internet.
  • Windows Application A traditional desktop application or program.
  • Windows 10 App A Windows program that is installed and maintained through the Windows Store and uses the type of interface you would typically see on a touchscreen device.
  • Shared Printer A printer that is attached to one computer but allows printing access to multiple computers and devices connected to the same network.
  • Print Job A file or set of files that have been submitted to a printer.
  • Print Queue A container that holds print jobs that are waiting to be sent to a printer that may be too busy to accept the print job.
  • Print Server A device or computer that connects client computers to printers. Client computers send print jobs to a print server that may hold them in a print queue before forwarding them to a printer.

Topics Discussed:

  • How can software applications increase your productivity at home or at the office?
  • What software applications can assist you in collaborating with other people?
  • What components are required to send a document to a printer?

Assignment:

  1. Access the TestOut Courseware through the provided link.
  2. Study Section 1.7: Application Software, and achieve a score of 80% or higher on the 14 question Exam to complete the Section.
  3. Remember that Friday, October 4th is the end of the term. All past due work must be turned in by Thursday, October 3rd to receive credit. Please plan accordingly.

Assigned: October 1st, 2019
Teacher Pacing Due Date: October 3rd, 2019

Section 1.6 – File Management – TestOut

Objective: 

This section introduces you to computer file system features and gives you practice managing files and folders on Windows. After finishing this section, you should be able to:

  • Describe common file system features, including compression, encryption, permissions, journaling, and file naming rules.
  • Compare and contrast common file systems, such as NTFS, FAT32, HFS, and Ext4.
  • Create folders in the Windows file system.
  • Copy, rename, and delete files in Windows.
  • Share a Windows folder with other users and grant them specific access to files within the folder.
  • Use the Windows Recycle Bin.

Links:

Key Terms:

  • File The smallest container within a computer’s storage system that is used to store information such as data, settings, and commands used in a computer program. A file is the smallest container that can be copied, deleted, or moved within a file system.
  • File Format The way in which a file is organized. Often, a file type is indicated by the file extension such as .jpg, .gif, .png., .mp3, .wav, .wma, .mp4, .avi, and .wmv.
  • File System The methods and structures that an operating system uses to organize files on a storage device like a hard drive. File systems often use directory structures to keep track of files.
  • Compression The process of making data consume less storage space.
  • Encryption The process of converting information so that it cannot be understood without decrypting it using a key, especially to prevent unauthorized access.
  • File Permissions The use of user and file attributes that control which users can read, write, move, or delete each file.
  • Journaling The process of tracking changes to a file so that a file can be repaired or restored in case of file corruption or data loss.

Topics Discussed:

  • How do operating systems keep track of documents and other files?
  • What are the most common file system features?
  • What is the main purpose of Windows file extensions?

Assignment:

  1. Access the TestOut Courseware through the provided link.
  2. Study Section 1.6: File Management, and achieve a score of 80% or higher on the 8 question Exam to complete the Section.

Assigned: September 23rd, 2019
Teacher Pacing Due Date: September 25th, 2019